Research Article
Session-HB: Improving the Security of HB with a Session Key Exchange
216 downloads
@INPROCEEDINGS{10.1007/978-3-319-72965-7_19, author={Ahmad Ka}, title={Session-HB: Improving the Security of HB with a Session Key Exchange}, proceedings={Innovation and Interdisciplinary Solutions for Underserved Areas. First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11--12, 2017, Proceedings}, proceedings_a={INTERSOL \& CNRIA}, year={2018}, month={2}, keywords={HB RFID tags Authentication LPN Session key exchange}, doi={10.1007/978-3-319-72965-7_19} }
- Ahmad Ka
Year: 2018
Session-HB: Improving the Security of HB with a Session Key Exchange
INTERSOL & CNRIA
Springer
DOI: 10.1007/978-3-319-72965-7_19
Abstract
The HB protocol, designed by Juels and Weis to mitigate forgery and counterfeiting risks on RFID tags, is well suited for those resource-constrained devices. The protocol comes in response to the search for a solution to improve the security of the HB protocol published in 2001 by Hopper and Blum that was not resistant to active attacks. However, Gilbert showed that HB cannot resist against a simple man-in-the-middle attack. In this paper, we propose to run a lightweight session key exchange as a pre-protocol to establish the tag and reader secrets for HB. The resulting protocol denoted Session-HB is provably resistant to man-in-the-middle attacks.
Copyright © 2017–2024 ICST